Login / Signup
How to Construct a Leakage-Resilient (Stateless) Trusted Party.
Daniel Genkin
Yuval Ishai
Mor Weiss
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
data sets
multi party
real time
real world
machine learning
learning algorithm
computer vision
multimedia
case study
image segmentation
multi agent